Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Resumen

Summary Learning Aim A/B | Unit 7 - IT Systems Security and Encryption | BTEC Computing | 2020

Puntuación
-
Vendido
-
Páginas
5
Subido en
12-08-2023
Escrito en
2020/2021

AB.D1 Evaluate the effectiveness of the techniques used to protect organisations from security threats while taking account of the principles of information security and legal requirements.

Institución
Grado

Vista previa del contenido

Pearson BTEC Level 3 Extended Certificate in Computing

Unit 7: IT Systems Security and Encryption

Learning Aim A/B:

AB.D1 Evaluate the effectiveness of the techniques used
to protect organisations from security threats
while taking account of the principles of
information security and legal requirements.

, D1 Effectiveness of techniques to protect
against security threats
Introduction

In this document I will be evaluating the effectiveness of the techniques used to protect our
organisation from security threats. The principles of information security and the legal requirements
are also important and will be considered in this document.

Security threats

There are a number of threats the company could face and we will need to use effective methods to
stop/mitigate the effects of them. Internal threats, such as employees gaining access to highly
confidential information, need to be prevented as if the banking details got into the wrong hands
they could be used for fraudulent activities. There are two main techniques which could be used to
protect against this type of attack, these are: having passwords and codes on certain files (File/folder
access controls) to protect files on the company network and having an access control system for
staff so that only certain employees can enter rooms which contain highly confidential information
customers private and banking details. Both these methods are classed as physical security and can
protect against security threats as they restrict the number of people who have access to this data,
meaning if someone just walked into the company building they wouldn’t have access to anything,
whilst only authorised staff members would have access to the data. To further improve the physical
security, we could install CCTV cameras around our building and offices, so that we could monitor
our site 24 hours a day, whilst having automatic locking doors (part of the access control) on the
server room would prevent any damage or theft of the data inside that room.

Physical Security: 8/10 | Overall, these methods of
physical security will be effective in protecting against
security threats as they will mitigate the chances of
someone, who shouldn’t have access to information,
looking or gaining data. They also meet the
requirements of the principles of confidentiality and
availability but could be prone to social engineering;
for example, an employee getting manipulated into
giving his password or information about clients away.

An additional threat includes external threats - those which come from outside the company. This
type of threat poses a bigger danger to our security as it would be harder to track down the
perpetrator and, because the software often used is hidden, it is harder to know when an attack has
occurred. To counter this threat, we will need to implement both hardware and software security -
these take the shape of anti-virus software and firewalls. On our systems we will need to use anti-
virus software as this will allow us to detect and destroy any computer virus. This is important as
viruses would destroy or steal data, and corrupt the computer system, so it is integral to use such
software to protect the confidential information we hold. To insure the highest protection against
viruses we will need to invest in the latest anti-virus software, as these are regularly updated to
detect and destroy new and improved viruses that may appear. Firewalls are also very important as
they would protect our systems and all the devices (computers and laptops) from any unauthorized


Unit 7: IT Systems Security and Encryption

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
12 de agosto de 2023
Número de páginas
5
Escrito en
2020/2021
Tipo
RESUMEN

Temas

$11.63
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
BTECcomputingANDbusiness
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
249
Miembro desde
5 año
Número de seguidores
160
Documentos
30
Última venta
2 meses hace

3.9

57 reseñas

5
26
4
13
3
10
2
5
1
3

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes